14
Stefan Marksteiner AVL List GmbH (Headquarters) Public IEEE SA - Standards for Trustworthy Autonomous Vehicles - Nurturing the Era of e2e Mobility as a Service (MaaS) Structured Approaches to Automotive Cybersecurity Testing

Structured Approaches to Automotive Cybersecurity Testing · 2021. 3. 5. · − Cyber security management system for automotive systems − Risk-based approach − Also demands testing,

  • Upload
    others

  • View
    2

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Structured Approaches to Automotive Cybersecurity Testing · 2021. 3. 5. · − Cyber security management system for automotive systems − Risk-based approach − Also demands testing,

Stefan Marksteiner

AVL List GmbH (Headquarters) Public

IEEE SA - Standards for Trustworthy Autonomous Vehicles - Nurturing the Era of e2e Mobility as a Service (MaaS)

Structured Approaches to Automotive Cybersecurity Testing

Page 2: Structured Approaches to Automotive Cybersecurity Testing · 2021. 3. 5. · − Cyber security management system for automotive systems − Risk-based approach − Also demands testing,

Stefan Marksteiner | | 12 Februar 2021 |/ 2Public

Standards & Regulations

Today‘s connected vehicles are insecure from a cybersecurity perspective. There is no system to comprehensively and automatically test the cybersecurity of vehicles and their systems and subsystems. This topic is, however, becoming both so important and complex that such a system will be heavily needed – as a product as well as service.

This is aggravated by standards’ (ISO/SAE 21434) and regulators’ (UNECE) requirements.

Page 3: Structured Approaches to Automotive Cybersecurity Testing · 2021. 3. 5. · − Cyber security management system for automotive systems − Risk-based approach − Also demands testing,

Stefan Marksteiner | | 12 Februar 2021 |/ 3Public

The Need for Industrialized Automotive Cybersecurity Testing

=> Need for automated testing over the whole life cycle

UNECE

− Regulation ECE/TRANS/WP.29/2020/79

− Mandates cybersecurity and cybersecurity management

− Requires testing of measures

− Adopted in EU, Japan and Korea

− Effective in EU for new types 2022 and for all new vehicles 2024

ISO/SAE (DIS) 21434

− Cyber security management system for automotive systems

− Risk-based approach

− Also demands testing, however, does not specify details

− To be supplemented for testing by ISO/WD PAS 5112

Page 4: Structured Approaches to Automotive Cybersecurity Testing · 2021. 3. 5. · − Cyber security management system for automotive systems − Risk-based approach − Also demands testing,

Stefan Marksteiner | | 12 Februar 2021 |/ 4Public

Cyber Testing Manually

Page 5: Structured Approaches to Automotive Cybersecurity Testing · 2021. 3. 5. · − Cyber security management system for automotive systems − Risk-based approach − Also demands testing,

Stefan Marksteiner | | 12 Februar 2021 |/ 5Public

Automotive Cybersecurity Testing Process

Systematic testing approach

Targets towards automating testing

Eight activities 1. Define Item

2. Perform Risk and Threat Analysis

3. Security Concept Definition (mainly including the test targets)

4. Plan Test and Develop Scenarios

a. Define Penetration Test Scenarios

b. Define Functional and Interface Test Scenarios

c. Define Fuzz Testing Scenarios

d. Define Vulnerability Scanning Scenarios

5. Select Test Scripts

a. Develop Test Scripts

b. Validate Test Scripts

6. Generate Test Cases

7. Perform Test

a. Prepare Test Environment

b. Execute Test Cases

8. Generate Test Reports.

Page 6: Structured Approaches to Automotive Cybersecurity Testing · 2021. 3. 5. · − Cyber security management system for automotive systems − Risk-based approach − Also demands testing,

Stefan Marksteiner | | 12 Februar 2021 |/ 6Public

Test Planning - Abstracting Test Patterns

The main part of the process is defining test scenarios and generating test cases

The relation between test scenarios and test cases are consists of abstraction and concretization

The purpose is portability through generalization

Page 7: Structured Approaches to Automotive Cybersecurity Testing · 2021. 3. 5. · − Cyber security management system for automotive systems − Risk-based approach − Also demands testing,

Stefan Marksteiner | | 12 Februar 2021 |/ 7Public

Test-preparative Actions

Define Item− Defines the test item (as needed for

testing)− Item boundaries (context, environment,

interfaces)− Functional description− Item model (or candidate black box testing) Perform Risk and Threat Analysis− E.g. TARA− Test priorization and non-testing Security Concept Definition− Test targets (building blocks from

requirements)

Page 8: Structured Approaches to Automotive Cybersecurity Testing · 2021. 3. 5. · − Cyber security management system for automotive systems − Risk-based approach − Also demands testing,

Stefan Marksteiner | | 12 Februar 2021 |/ 8Public

Test Planning

Create a realistic scenario of a cybersecurity attack− Penetration testing− Functional & interface testing− Fuzz testing− Vulnerability scanning Consists of abstract test building blocks − No SuT-specific information− Principal steps to perform an actual attack

Page 9: Structured Approaches to Automotive Cybersecurity Testing · 2021. 3. 5. · − Cyber security management system for automotive systems − Risk-based approach − Also demands testing,

Stefan Marksteiner | | 12 Februar 2021 |/ 9Public

Script Selection and Test Case Generation

Script Selection− Development of actual test scripts− Concrete, executable versions of attack

patterns specific for distinct SuTs Test Case Generation− Attributes a known attack

script/vulnerability to a step in the test scenario

− Turns scenarios in executable test cases

Page 10: Structured Approaches to Automotive Cybersecurity Testing · 2021. 3. 5. · − Cyber security management system for automotive systems − Risk-based approach − Also demands testing,

Stefan Marksteiner | | 12 Februar 2021 |/ 10Public

Test Execution

Perform Test− Prepare Test Environment (commissioning,

cleaning procedure)− Execute Test Cases Generate Test Reports

Page 11: Structured Approaches to Automotive Cybersecurity Testing · 2021. 3. 5. · − Cyber security management system for automotive systems − Risk-based approach − Also demands testing,

Stefan Marksteiner | | 12 Februar 2021 |/ 11Public

Concept Automotive Testing Framework

A Framework that facilitates automated execution of the automotive cybersecurity testing process

May consist of a core framework, test derivation, test management and interfaces

Core FW with orchestration, test case generation, execution and test assessment

Interfaces should be versatile for different types of SUTs to allow for different life cycle stages

Page 12: Structured Approaches to Automotive Cybersecurity Testing · 2021. 3. 5. · − Cyber security management system for automotive systems − Risk-based approach − Also demands testing,

Stefan Marksteiner | | 12 Februar 2021 |/ 12Public

Security Testing throughout the Whole Life Cycle

Apart from traditional testing stages (right side of the V model), interfaces for (partly or fully) simulated are introduced:

− Model-in-the-loop (MiL)

− Software-in-the-loop (SiL)

− Hardware-in-the-loop (HiL)

The “tail” of the V model

− Vulnerability management feeds test cases for incidents that emerge after the completion of the design

− Software updates (OTA) could also be simulated first and real system-tested later to allow for full-life cycle testing

Page 13: Structured Approaches to Automotive Cybersecurity Testing · 2021. 3. 5. · − Cyber security management system for automotive systems − Risk-based approach − Also demands testing,

Stefan Marksteiner | | 12 Februar 2021 |/ 13Public

Conclusion

The process tries to address this and make automotive security testing:- Automatable- Comparable- Efficient

Page 14: Structured Approaches to Automotive Cybersecurity Testing · 2021. 3. 5. · − Cyber security management system for automotive systems − Risk-based approach − Also demands testing,

Stefan Marksteiner | | 12 Februar 2021 |/ 14Public

Thanks!

Thank you for your attention!

Stefan Marksteiner1

1 Senior Technology Scout Cyber Security, AVL List Gmbh, [email protected] work was supported by the H2020-ECSEL programme of the European Commission; grant no. 783119, SECREDAS project.